EUMEDCONNECT2 AAI information day

Size: px
Start display at page:

Download "EUMEDCONNECT2 AAI information day"

Transcription

1 EUMEDCONNECT2 AAI information day Rome, 9 November 2010 Stefano Zanmarchi Università di Padova stefano.zanmarchi@unipd.it

2 Agenda I Federations Coffe Break II Digital Identity Management Lunch Break III AAI and Shibboleth Coffe Break IV Trust within the Federation Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 2

3 I Federations II Digital Identity Management III AAI and Shibboleth IV Trust within the Federation Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 3

4 Introduction This information day was organized in collaboration with the IDEM Federation. What is IDEM? The Acces Management Federation of italian universities and research institutions. GARR coordinates IDEM and supplies technical and administrative support for the management of the Authentication and Authorization Infrastructure based on the SAML standard We ll get back to all these concepts later Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 4

5 IDEM The main aim of IDEM is to create and support a common framework to facilitate trusted web access of users (researchers, teachers and students) of the participating institutions (universities and research institutions) to resources (e.g. journals, instruments, data). As of october 2010 ( 22 participating members 31 resources Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 5

6 IDEM, Members and Resources Participating Members CASPUR CILEA Consiglio Nazionale delle Ricerche GARR ISTAT Politecnico di Milano Università "Ca' Foscari" Venezia Università degli Studi di Bari "Aldo Moro" Università degli Studi di Cagliari Università degli Studi di Ferrara Università degli Studi di Milano-Bicocca Università degli Studi di Modena e Reggio Emilia Università degli Studi di Padova Università degli Studi di Parma Università degli Studi di Pavia Università degli Studi di Torino Università degli Studi di Trento Università degli Studi di Urbino "Carlo Bo" Università degli Studi Roma Tre Università di Bologna Università IUAV di Venezia Università Politecnica delle Marche Resources AAI WIKI CILEA Digital Library Emeroteca Virtuale GARR VCONF Moodle-Shib Nilde Utenti Pathology Atlases ScienceDirect Scopus SP di Prova SpringerLink TERENA Certificate Service (TCS) TERENA Certificate Service (TCS) WiFi CASPUR WiFi UniFE (Wi-Fe) WiFi UniTO WiFi@ToCNR YouBlog ALMA ARC Botta e Risposta IDEM (intranet) IDEM AUTH JOOMLA IEEE Xplore Spaces (wiki) Web Of Knowledge WiFi CNR Pisa Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 6

7 IDEM Governance Member Board composed by representatives of all participating institutions Policy Committee performs organizational tasks 8 members elected by the Member Board 1 member designated by GARR Technical and Scientific Committee performs technical tasks 12 members elected by the Policy Commitee 1 member designated by GARR Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 7

8 Switzerland: SWITCH AAI Focused on higher education in Switzerland Coordinated by SWITCH The Swiss Education and Research Network The federation covers all Swiss universities as well as some universities of applied sciences users (>96% of all persons in Swiss higher education) 9.2 M logins/year Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 8

9 USA: InCommon Operated by Internet2 A community of more than 4.5 million end users. (Source: Higher Education Students, Faculty, and Staff, Integrated Postsecondary Education Data System. Calculated April 2010.) 255 current participants Higher Education Participants (182) Government and Nonprofit Laboratories, Research Centers, and Agencies (7) Sponsored Partners (66) Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 9

10 National Federations in the world Survey (2010) by REFEDs 1..at ACOnet-AAI 2..au AAF 3..br CAFe 4..ca CAF 5..ch SWITCHaai 6..cz eduid 7..de DFN-AAI 8..dk WAYF 9..es SIR 10..fi Haka 11..fr Fédération Éducation-Recherche 12..gr GRNET 13..hr 14..hu eduid 15..ie Edugate 16..it IDEM 17..jp GakuNin 18..lv LAIFE 19..nl SURFnet 20..no FEIDE 21..nz Tuakiri 22..pt RCTSaai 23..se SWAMID 24..si ArnesAAI 25..uk UK Access Management Federation for Education and Research 26..us InCommon Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 10

11 Federation Costs REFEDs Survey (2010 ) shows: Manpower: from best effort (0.5 FTE) to ~ 6-7 FTE Budget not disclosed, apart from: Haka (.fi): ~300 K /year Tuakiri (.nz): ~860 K /year UK Access Management Federation: ~1,37M /year Incomes: Usually part of the NREN budget Some federations apply membership feee Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 11

12 Inter-federation interoperability Three distinct methods for facilitating interoperability between federations: Confederations: federation of federations, highly hierarchical control Peering: bi-/multi-lateral agreements Virtual Organizations (VOs): not under single hierarchical control Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 12

13 Confederations Sets of cooperating federations, or federated federations, governed by an overaching organisation, with member federations administerd locally. Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 13

14 Peering Two (or more) federations establishing interfederation trust links, with a trust model which relies on federations independently entering into bi-/multi-lateral agreements Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 14

15 Virtual Organizations Groups of associations of users, from one or more federations, not under single hierarchical control, joining forces to achieve a common goal, bringing to the collaboration a subset of their resources, sharing those at their discretion and each under their own conditions. Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 15

16 EduGAIN Project by GÉANT Based on SAML It s not a Federation, it s a service to connect Federations Pre-pilot phase: Croatia, Czech Republic, Finland, Germany, Poland and Switzerland Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 16

17 Kalmar2 Cross-Nordic authentication system for higher education and research. Students and staff members in a Nordic university or research institution can use a single username and password to access services in other Nordic countries Finland, Norway, Denmark, Sweden, Iceland Based on SAML 2.0 technology (SimpleSAMLphp and Shibboleth) Kalmar 2, because the 1 st Kalmar Union lasted from 1397 to 1524 (economical, political and military cooperation ) Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 17

18 The Australian/New Zealand co-federation No operational New Zealand Access Federation yet Three NZ Institutions have joined the Australian Access Federation (AAF) as best endeavours members: The University of Auckland The University of Canterbury Lincoln University Ongoing NZFed Project aims: Establish the NZ Access Federation Link the NZ Access Federation to AAF Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 18

19 I Federations II Digital Identity Management III AAI and Shibboleth IV Trust within the Federation Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 19

20 Identity Management is important Peter Steiner, The New Yorker, 5 July 1993 Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 20

21 Basic concepts: authentication Authentication: the process of verifying the authenticity of the claim about the user s identity: verification that the user is who he claims to be. Identity can be proven by something you know (a password) something you have (smart cards, USB tokens, or pk certificates) something you are, represented by positive photo identification, fingerprints, biometrics, or other techniques Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 21

22 Basic concepts: authorization Authorization: the process of verifying whether a user has the right to access protected resources. Typically digital systems perform authorization checks based on user identity information: who he is some of his attributes : Role (professor, student, alumnus) University tuition fees paid (yes no) who is defined by a set of identifying attributes Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 22

23 Authentication vs. Authorization Authentication & Authorization are two distinct processes Often performed in a row by the same application, but still distinct Abbreviations: AuthN (Authentication) AuthZ (Authorization) Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 23

24 Digital Identity Digital systems represent users (but also devices, resources, ) in their domain as digital entities. Every digital entity has a finite number of attributes defining it s identity. Example of a user s digital identity attributes: Username Password X.509 Digital Certificate Name, surname Home organization Role within home organization Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 24

25 Digital Identity Identifiers: a subset of attributes that unambiguously identify the entity. Examples: Social ID Number (name, surname, place of birth, date of birth) Not easy to define: To Plato's definition of a man as an animal, bipedal and featherless, Diogenes plucked a chicken and declared, "Here is Plato's man. Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 25

26 Identity Management Hear me! For I am such and such a person Above all, do not mistake me for someone else! - Friedrich Nietzsche, Ecce Homo What is Identity Management (IM)? Identity Management is the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities - The Burton Group It is more than account creation, more then directories, authentication, access controls, etc. It includes policy, process, governance, trust, and new ways of thinking about IT Steven T. Carmody Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 26

27 Identity Management Identity Management is a continuous process: as people travel through an Institution from their very first time to their retirement they must be tracked without creating duplicates Example: as time goes by Anne Smith could be: student student & university staff alumnus & university staff alumnus alumnus & professor time Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 27

28 Identity and Access Management Identity and Access Management (IAM) is more then IM: Identity management refers to the policies, processes, and technologies that establish user identities and enforce rules about access to digital resources ( IM and IAM are often used interchangeably Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 28

29 IAM Stakeholders Source: Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 29

30 IAM Lifecycle Steve Devoti Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 30

31 IAM Process IAM is a continuous and demanding process Better done only once (centralize!) Starting point: your Systems of Record (SoRs): Student Info. and HR Systems, Department IT Systems End (and start-again) point: place each person in the enterprise registry with a unique ID & identity attributes, and track changes in SoRs. Can be divided in a set of IAM functions Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 31

32 IAM Functions 1 Reflect: obtain populations of interest from an authoritative System of Record (SoR, e.g. Student Info System or HR System) and place selected information into an enterprise registry. Also track changes to institutional data from changes in SoR. Join/Reconcile: remove ambiguities and resolve information from multiple SoRs about a person. Results in a person being placed in the enterprise registry with a unique identifier. Credential: issue credentials (username/password) Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 32

33 IAM Functions 2 Manage: manage Auhorization information (e.g. Affiliation, Groups, Privileges, Entitlements) Authenticate: make sure who the person is Provide: provide the identity and authz information to resources for access decisions. Methods: Provision: push IAM info to made available to resources, to retrieve when needed Relay/Deliver: information made available when requested Authorize: allow/deny decision for access to resources Log: track usage for auditing and accounting purposes Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 33

34 Why Institutional (centralized) IAM? Steve Devoti Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 34

35 Why IAM? Simplifies user scaling (5000, 10000, 15000,...) Promotes the introduction of new services Reduces the incremental cost to implement a new service Reduce IT costs (many organizations save 30% or more by just implementing password management) Last but not least: bedrock for Single Sign On! Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 35

36 Evolution of IAM Stone Age: Application maintains credentials (username & password) and identity information for each user Bronze Age Credentials are centralized (e.g. Kerberos, LDAP) but applications maintain all user identity information Iron Age Credentials and core identity information is centralized and application maintains only app-specific user data These solutions assume applications are within the same administrative domain. Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 36

37 Federated Identity and Access Management Classical IAM solutions assume applications are within the same administrative domain Federated Identity and Acces Management (FIAM) is the next step: sharing identity information managed only at the user s home organization with applications of external organizations outside the user s administrative domain. Successful idea: the number of federations is growing Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 37

38 Basic concept of FIAM Service Provider at Organization B web page Identity Provider at Organization A username password A user from Organization A: 1. tries accessing a protected resource on a Service Provider at Organization B 2. gets redirected to the WAYF where he choses the Identity Provider of his Home Organization from a list. 3. gets redirected to the IdP's login page. 4. upon successful authentication gets redirected to the Service Provider carrying identity data (attributes) about himself. The SP decides wether to grant access or not to the web page. Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 38

39 What is a Federation? In FIAM: Identity Providers* (IdP) perform authentication and publish identity information (attributes) about users Service Providers* (SP) consume this information and pass it to applications that provide the user with the requested resources (typically web pages) A Federation is a group of collaborating organizations running IdPs and SPs that share: Technical agreements (protocols, ldap schemas, ) Trust agreements (*) Shibboleth therminology Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 39

40 Federation Components [source: switch.ch/aai] Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 40

41 Federation: Security & Privacy FIAM allows active protection of: User s credentials only the IdP handles the credentials only the IdP performs user authentication User s identity information the IdP releases a customized set of information to each SP only the minimal set of attributes necessary for the specific SP to provide the service Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 41

42 I Federations II Digital Identity Management III AAI and Shibboleth IV Trust within the Federation Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 42

43 Authentication and Authorization Infrastructure Federations need an AAI to work What is an AAI? Middleware software system that allow the delegation of authentication and authorization issues to different instances. Distributed software: Client component (=browser) SP component IdP component AAIs connect user communities to resources Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 43

44 Without AAI (username & password) Stefano Zanmarchi, EUMEDCONNECT2 AAI information day [source: switch.ch/aai] 44

45 With AAI (username & password) Stefano Zanmarchi, EUMEDCONNECT2 AAI information day [source: switch.ch/aai] 45

46 Without AAI With AAI Stefano Zanmarchi, EUMEDCONNECT2 AAI information day [source: 46

47 Without AAI Tedious user registration at all resources Often outdated user data at resources Different login processes Many different usernames and passwords Many resources not protected due to difficulties Often IP-based authorization Costly implementation of inter-institutional access Stefano Zanmarchi, EUMEDCONNECT2 AAI information day [source: switch.ch/aai] 47

48 With AAI: benefits for the user Single Sign On: No more different usernames and passwords Login performed just once at the user s home organization to access all resources User data always current, on all applications: New phone number, address, immediately updated on all resources Privacy: The accessed SP receives only attributes required to provide service. Often not even identity information: it might be enough to know that the user is enrolled at an Institution! Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 48

49 With AAI: benefits for the administrator Reduces work Authentication-related calls to Penn State s helpdesk dropped by 85% after they installed Shibboleth No user registration and user data maintenance at resource needed Insulation from service compromises In FIAM data is pushed to services as needed. If those services are compromised the attacker can t get everyone s data. Minimize attack surface area Only the IdP needs to be able to contact user data stores. All effort can be focused on securing this one connection instead of one (more) connection per service. [source: switch.ch/aai] Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 49

50 With AAI: benefits for Institutions Efficient implementation of inter-institutional access. Easy to join. Collaboration between multiple organizations is simplified, exchange of knowledge is facilitated. Reduced administration costs: existing identity management system used for access to all resources High privacy requirements met, appropriate protection of personal information when accessing resources at other Institutions [source: switch.ch/aai] Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 50

51 AAI at work: a practical short tour Now I ll access some resorces within my Institution and some outside it, but within the IDEM Federation We ll remove the cookies of the IdP and see what happens Nice videos (by JISC and AAF ): Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 51

52 Shibboleth An Internet2 Middleware Project, an open source AAI, that enables web single sign on (SSO) across or within organizational boundaries Conceived in spring of 2000 Based on the SAML standard Internationally used by universities Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 52

53 Why Shibboleth? A use of language regarded as distinctive of particular group. First Known Use: 1638 ( Hebrew shibbōleth stream ; from the use of this word in Judg 12:6 as a test to distinguish Gileadites from Ephraimites During World War II the Dutch used the name of the town Scheveningen as a shibboleth to find out German infiltrators Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 53

54 Shibboleth history Started 2000 under the MACE working group After an alpha, two betas, and two point releases were distributed to testing communities Shibboleth 1.0 was released on July 1, 2003 (Partial implementation of SAML1) Shibboleth 1.3 was released on August 26, 2005 Shibboleth 2.0 was released on March 19, 2008 (Partial implementation of SAML2) Current 2.2.0, released on Sept 23, 2010 Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 54

55 SAML Security Assertion Markup Language XML-based framework for exchanging authentication and authorization data between entities Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 55

56 SAML SAML is the lingua franca of Federations SAML V2.0 not backwards-compatible OASIS standard SAML profiles offer interop for a variety of use cases Shibboleth 2 implements SAML 2.0 Web Browser SSO Profile Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 56

57 SAML 2.0 Basic Concepts Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 57

58 SAML 2.0 Assertions A declaration containing one or more statements about a subject Authentication statement: Joe authenticated with a password at 9:00am Attribute statement: Joe is a manager with a $500 spending limit It s all XML: <saml:assertion... >... <saml:authnstatement AuthnInstant=" T12:00:00Z" SessionIndex=" "> <saml:authncontext> <saml:authncontextclassref> urn:oasis:names:tc:saml:2.0:ac:classes:passwordprotectedtransport </saml:authncontextclassref> </saml:authncontext> </saml:authnstatement> Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 58

59 SAML 2.0 Protocols Request/response pairs that give the processing rules to be followed when producing or consuming assertions Assertion Query and Request Protocol Authentication Request Protocol Artifact Resolution Protocol Name Identifier Management Protocol Single Logout Protocol Name Identifier Mapping Protocol Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 59

60 SAML 2.0 Request/Response example Request AttributeQuery Response Assertion AttributeStatement How do we move around SAML requests/responses? No need to reinvent things: using standard protocols Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 60

61 SAML 2.0 Bindings Mapping of a SAML protocols onto standard messaging or communication protocols HTTP Redirect (GET) Binding HTTP POST Binding HTTP Artifact Binding SAML URI Binding SAML SOAP Binding (based on SOAP 1.1) Reverse SOAP (PAOS) Binding Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 61

62 Example: SAML 2.0 SOAP binding <SOAP-ENV:Envelope > <SOAP-ENV:Header/> <SOAP-ENV:Body> <samlp:response > <samlp:status> </samlp:status> <saml:assertion > </saml:assertion> </samlp:response> </SOAP-ENV:Body> </SOAP-ENV:Envelope> HTTP Header HTTP Body SOAP Header SOAP Body SAML request or response Source: Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 62

63 SAML 2.0 Profiles Describe in detail how assertions, protocols, and bindings combine to support defined use cases. The most important is called Web Browser Single Sign On and addresses the use case of authz and authn when accessing web applications across institutional boundaries 12 possible deployments of the Web Browser SSO Profile depending on the bindings chosen The SP can use 4 (HTTP Redirect, HTTP POST and two forms of HTTP Artifact) The IdP can use 3 (HTTP POST, two forms of HTTP Artifact) Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 63

64 Shib at work: a practical short tour Install Live HTTP Headers on Mozilla Firefox Deactivate JavaScript Follow the shib communication flow Base64 decode SAML response from HTML source ode/ Try [Handler]/Shibboleth.sso/Session Nice demos: Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 64

65 Shib Institutional Communication Flow Browser Service Provider Identity Provider 1. Access Service URL 2. AuthN Request (browser redirected to the SP) 3. Authenticate 4. Assertion with AuthN & Attribute Information (browser redirected to the SP) 5. Provide Content Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 65

66 Interinstitutional Communication Flow Source: Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 66

67 Single Log Out, Local Log Out Single Logout is a SAML 2.0 Profile Not (yet?) implemented in Shibboleth2 Read why There is some hope though: event/aai-info-day-2009/slides/aai-id09-51-slo.pdf Shibboleth 2 supports Local Log Out [Handler]/Shibboleth.sso/Logout but the IdP session remains active Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 67

68 Facts on Shibboleth Shib knows nothing about boundaries Federations, Cofederations, Peering, Virtual Organizations. It just performs web browser SSO Easy setup, but Shib doesn t do any Identity Management Shib is not the only open source SAML implementation, see SimpleSAMLphp ( ) Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 68

69 Shibbolizing applications Sysadmin work: Install SP and configure it to work with an IdP Map attributes received from the IdP onto web server environment variables Programmer s use env variables as usual: PHP: if ($_SERVER[ affiliation ] == staff ) { grantaccess() } Perl: if ($ENV{ affiliation } == staff ) { &grantaccess() } Java: if (request.getheader( affiliation ).equals( staff ) ) { grantaccess() } Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 69

70 Shibbolized applications Many applications already shibbolized : CMSs, Elearning Systems, Wikis, Number keeps on growing Enabled Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 70

71 Links shibboleth.internet2.edu Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 71

72 I Federations II Digital Identity Management III AAI and Shibboleth IV Trust within the Federation Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 72

73 Federation Manager A Federation is a group of collaborating Organizations running IdPs and SPs that share: Technical agreements (protocols, ldap schemas, ) It s not enough to agree on using Shibboleth! Trust agreements The basis of Federations is mutual trust: I trust your authn process, you trust mine I trust the user attributes you send me, you trust mine A Federation Manager is needed to coordinate activities and, most important, to make trust possible Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 73

74 Organizations must agree on Technical Interoperability Supported protocols User authentication mechanisms User attribute specifications Accepted X.509 certificates Legal Interoperability Membership agreement/contract Federation operation policies Requirements on IM practices Procedures for handling sensitive personal information Others Common best operational practices Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 74

75 IDEM Rules, Policies & Agreements Technical and Legal IDEM documents: Member Accession Form Resource Registration Request Identity Provider Registration Request Memorandum of Understanding Rules of Participation Federation Regulation Attribute Specification DOPAU (IM practices) Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 75

76 Federation Manager s tasks I At a very minimum the Federation Manager Acts as Trust notary : verifies the identity of Organizations and their delegated officers Maintains the list of which IdPs and SPs are in the federation: the federation metadata Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 76

77 Federation Metadata An XML document describing every IdP and SP. Contains Unique identifier (entityid) for each SP/IdP Endpoints where each SPs/IdPs can be contacted Certificates used for signing and encrypting exchanged data May contain Organization and person contact information Information about which attributes an SP wants/needs Usually distributed by a public HTTP URL Metadata must be kept up to date so that New entities can work with existing ones Old, or revoked, entities are blocked Metadata should be signed by the Federation Manager Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 77

78 Federation Manager s tasks II Most Federation Managers also: Define agreements, rules, and policies for participants Provide some user support: Documentation list, helpdesk Organize periodic meetings, workshops Operate a Central Discovery Service (WAYF) Operate a test infrastructure Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 78

79 Federation Manager s tasks III Some Federation Managers: Provide self-service tools for managing IdP and SP data Install IdPs and SPs for members Verify that Organizations stand by their commitments Develop custom tools or application integration support : Resource Registry Virtual Home Organization Group Management Tool Attribute Viewer Joomla idemauth uapprove AAIEye Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 79

80 Levels of Assurance (LOAs) Important part of the trust fabric IdPs indicate how much trust is behind the authn event (e.g. Level 1, Level 2, ) SPs, based on their own needs and assessment of risks, determine what LOA they require to allow user access Assurance is separated into two concepts: The strength of the processes used to identify the user at the time of user registration The strength of the authn method(s) used Links: Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 80

81 Thank you! Q & A Stefano Zanmarchi, EUMEDCONNECT2 AAI information day 81

Federated Identity Management

Federated Identity Management Federated Identity Management SWITCHaai Team aai@switch.ch Agenda 2 What is Federated Identity Management? What is a Federation? The SWITCHaai Federation Interfederation Evolution of Identity Management

More information

Broadening Iden-ty & Access Management: InCommon Federa-on

Broadening Iden-ty & Access Management: InCommon Federa-on Broadening Iden-ty & Access Management: InCommon Federa-on John Krienke jcwk@internet2.edu 700 InCommon Participants Year-to-Year https://www.incommon.org/participants/ Number of Participants 600 500 400

More information

Federated Identity Management

Federated Identity Management Federated Identity Management SWITCHaai Introduction Course Bern, 1. March 2013 Thomas Lenggenhager aai@switch.ch Overview What is Federated Identity Management? What is a Federation? The SWITCHaai Federation

More information

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI

More information

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier ש בולת SD Departmental Meeting November 28 th, 2006 Ale de Vries Product Manager ScienceDirect Elsevier Shi... whát? : Shibboleth ש בולת [...] "stream, torrent". It derives from a story in the Hebrew Bible,

More information

Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5

Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User

More information

How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data

How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data 2014 Fifth International Conference on Computing for Geospatial Research and Application How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data Andreas Matheus University of

More information

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department jmikhael@masdar.ac.ae Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation

More information

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access

More information

Biometric Single Sign-on using SAML Architecture & Design Strategies

Biometric Single Sign-on using SAML Architecture & Design Strategies Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems Ramesh.Nagappan@sun.com 1 Setting Expectations What you can take away! Understand

More information

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia ei09095@fe.up.pt. Pedro Borges ei09063@fe.up.pt

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia ei09095@fe.up.pt. Pedro Borges ei09063@fe.up.pt Computer Systems Security 2013/2014 Single Sign-On Bruno Maia ei09095@fe.up.pt Pedro Borges ei09063@fe.up.pt December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................

More information

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: sascha.neinert@rus.uni-stuttgart.de

More information

Shibboleth Identity Provider (IdP) Sebastian Rieger sebastian.rieger@gwdg.de

Shibboleth Identity Provider (IdP) Sebastian Rieger sebastian.rieger@gwdg.de Shibboleth Identity Provider (IdP) Sebastian Rieger sebastian.rieger@gwdg.de Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford

More information

Identity and Access Management for Federated Resource Sharing: Shibboleth Stories

Identity and Access Management for Federated Resource Sharing: Shibboleth Stories Identity and Access Management for Federated Resource Sharing: Shibboleth Stories http://arch.doit.wisc.edu/keith/apan/ apanshib-060122-01.ppt Keith Hazelton (hazelton@doit.wisc.edu) Sr. IT Architect,

More information

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle lukas.haemmerle@switch.ch

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle lukas.haemmerle@switch.ch AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle lukas.haemmerle@switch.ch Berne, 13. August 2014 Introduction App by University of St. Gallen Universities

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR

A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR A Shibboleth View of Federated Identity Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR Short Section Title Agenda Assumptions and Trends Identity Management and Shibboleth Shibboleth

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Version 27.0: Spring 13 Single Sign-On Implementation Guide Last updated: February 1, 2013 Copyright 2000 2013 salesforce.com, inc. All rights reserved. Salesforce.com is a registered trademark of salesforce.com,

More information

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

Licia Florio Project Development Officer licia@terena.org www.terena.org Identity Federations in Europe

Licia Florio Project Development Officer licia@terena.org www.terena.org Identity Federations in Europe APAN Conference Honolulu, Hawaii 24 January 2008 Licia Florio Project Development Officer licia@terena.org www.terena.org Identity Federations in Europe Outline Networking Organisations in Europe Requirements

More information

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management

More information

Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu

Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu International Center for Advanced Internet Research Outline Security Mechanisms Access Control Schemes

More information

Introducing Shibboleth

Introducing Shibboleth workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources

More information

IAM Application Integration Guide

IAM Application Integration Guide IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document

More information

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart sascha.neinert@rus.uni-stuttgart.de

More information

ESA EO Identify Management

ESA EO Identify Management ESA EO Identify Management The ESA EO IM Infrastructure & Services A. Baldi ESA: Andrea.Baldi@esa.int M. Leonardi ESA: m.leonardi@rheagroup.com 1 Issues @ ESA with legacy user management Users had multiple

More information

IAM, Enterprise Directories and Shibboleth (oh my!)

IAM, Enterprise Directories and Shibboleth (oh my!) IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services windhamg@email.arizona.edu What is IAM? Identity and Access

More information

Federated Wikis Andreas Åkre Solberg andreas@uninett.no

Federated Wikis Andreas Åkre Solberg andreas@uninett.no Federated Wikis Andreas Åkre Solberg andreas@uninett.no Wikis in the beginning...in the beginning wikis were wide open. Great! - But then the spammers arrived. Password protected wikis Create yet another

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Federated Identity & Access Mgmt for Higher Education

Federated Identity & Access Mgmt for Higher Education Federated Identity & Access Mgmt for Higher Education Dr. Erik Vullings Program Manager Macquarie University s s E-Learning E Centre of Excellence (MELCOE) Erik.Vullings@melcoe.mq.edu.au 1/23/2006 1 Backing

More information

Open Source Identity Integration with OpenSSO

Open Source Identity Integration with OpenSSO Open Source Identity Integration with OpenSSO April 19, 2008 Pat Patterson Federation Architect pat.patterson@sun.com blogs.sun.com/superpat Agenda Web Access Management > The Problem > The Solution >

More information

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Разработка программного обеспечения промежуточного слоя TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Contents - SURFnet Middleware Services department: - eduroam, SURFfederatie,

More information

Biometric Single Sign-on using SAML

Biometric Single Sign-on using SAML Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP Ramesh.Nagappan@sun.com 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Security Assertion Markup Language (SAML) 2.0 Technical Overview

Security Assertion Markup Language (SAML) 2.0 Technical Overview 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Security Assertion Markup Language (SAML) 2.0 Technical Overview Working Draft 03, 20 February 2005 Document identifier:

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

Federated Identity Management Solutions

Federated Identity Management Solutions Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology jkallela@cc.hut.fi Abstract Federated identity management allows users to access multiple services based on a single

More information

Single Sign-On for the UQ Web

Single Sign-On for the UQ Web Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user

More information

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees Identity Management and Shibboleth h at MSU Jim Green Manager, Identity Management Michigan State t University it Academic Technology Services Identity Management Definition: Identity management is the

More information

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

DocuSign Single Sign On Implementation Guide Published: March 17, 2016 DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents

More information

Extending DigiD to the Private Sector (DigiD-2)

Extending DigiD to the Private Sector (DigiD-2) TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

SAML Federated Identity at OASIS

SAML Federated Identity at OASIS International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for

More information

Integrating Multi-Factor Authentication into Your Campus Identity Management System

Integrating Multi-Factor Authentication into Your Campus Identity Management System Integrating Multi-Factor Authentication into Your Campus Identity Management System Mike Grady, Unicon David Walker, Internet2 (both associated with the Internet2 Scalable Privacy Project) Agenda Multi-Context

More information

Using Shibboleth for Single Sign- On

Using Shibboleth for Single Sign- On Using Shibboleth for Single Sign- On One Logon to Rule them all.. Kirk Yaros Director, Enterprise Services Mott Community College 1 Agenda Overview of Mott Overview of Shibboleth and Mott s Project Review

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity

DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity DEPLOYMENT GUIDE SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity Table of Contents SAML Overview...3 Integration Topology...3 Deployment Requirements...4 Configuration Steps...4 Step

More information

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. venkadeshkumaresan@yahoo.co.in 2 Professor-CSC

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Feide Technical Guide. Technical details for integrating a service into Feide

Feide Technical Guide. Technical details for integrating a service into Feide Feide Technical Guide Technical details for integrating a service into Feide May 2015 Document History Version Date Initials Comments 1.0 Nov 2009 TG First issue 1.2 Nov 2009 TG Added SLO description 1.3

More information

National Identity Exchange Federation. Web Browser User-to-System Profile. Version 1.0

National Identity Exchange Federation. Web Browser User-to-System Profile. Version 1.0 National Identity Exchange Federation Web Browser User-to-System Profile Version 1.0 August 18, 2014 Table of Contents TABLE OF CONTENTS 1 1. TARGET AUDIENCE AND PURPOSE 2 2. TERMINOLOGY 2 3. REFERENCES

More information

Single Sign on Using SAML

Single Sign on Using SAML Single Sign on Using SAML Priyank Rajvanshi, Subhash Chand Gupta Abstract- With the proliferation of SaaS and other web-based applications, identity management is becoming a major concern for businesses.

More information

2015-11-30. Web Based Single Sign-On and Access Control

2015-11-30. Web Based Single Sign-On and Access Control 0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking

More information

Federated Identity Management Checklist

Federated Identity Management Checklist Federated Identity Management Checklist This document lists the minimum (marked with an *) and recommended policy, process, and technical steps required to implement Federated Identity Management and operate

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES 1. Federation Participant Information 1.1 The InCommon Participant Operational Practices information below is for: InCommon Participant organization

More information

AAA for IMOS: Australian Access Federation & related components

AAA for IMOS: Australian Access Federation & related components AAA for IMOS: Australian Access Federation & related components James Dalziel Professor of Learning Technology, and Director, Macquarie E-Learning Centre Of Excellence (MELCOE) Macquarie University james@melcoe.mq.edu.au

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Royal Roads University_ Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they

More information

MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard

MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY ASR 2006/2007 Final Project Supervisers: Maryline Maknavicius-Laurent, Guy Bernard Federated Identity Project topic Superviser: Maryline Maknavicius

More information

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie ShibboLEAP Project Final Report: School of Oriental and African Studies (SOAS) Colin Rennie May 2006 Shibboleth Implementation at SOAS Table of Contents Introduction What this document contains Who writes

More information

in Swiss Higher Education

in Swiss Higher Education AAI in Swiss Higher Education Ueli Kienholz, 2006 SWITCH Without AAI University A Student Admin Web Mail e-learning Tedious user registration at all resources Unreliable and outdated

More information

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

Logout Support on SP and Application

Logout Support on SP and Application Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team aai@switch.ch Single Logout: Is it possible? Single Logout will work only in some

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Identity Management and E-learning Standards for Promoting the Sharing of Contents and Services in Higher Education

Identity Management and E-learning Standards for Promoting the Sharing of Contents and Services in Higher Education Identity Management and E-learning Standards for Promoting the Sharing of Contents and Services in Higher Education Paulo Alves ¹, James Uhomoibhi ² EUNIS E-learning Task Force ¹ ² ¹Instituto Politécnico

More information

Security Assertion Markup Language (SAML)

Security Assertion Markup Language (SAML) CS 595G 02/14/06 Security Assertion Markup Language (SAML) Vika Felmetsger 1 SAML as OASIS Standard OASIS Open Standard SAML V2.0 was approved in March, 2005 Blending of two earlier efforts on portable

More information

OIOSAML 2.0 Toolkits Test results May 2009

OIOSAML 2.0 Toolkits Test results May 2009 OIOSAML 2.0 Toolkits Test results May 2009 5. September 2008 - Søren Peter Nielsen: - Lifted and modified from http://docs.google.com/a/nemsso.info/doc?docid=dfxj3xww_7d9xdf7gz&hl=en by Joakim Recht 12.

More information

Issues in federated identity management

Issues in federated identity management Issues in federated identity management Sandy Shaw EDINA IASSIST 24-27 May 2005, Edinburgh 1 Contents Federated identity management overview Open issues for federations 2 Introduction Federated identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: McGill University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper

Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator

More information

Lecture Notes for Advanced Web Security 2015

Lecture Notes for Advanced Web Security 2015 Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

Configuring. Moodle. Chapter 82

Configuring. Moodle. Chapter 82 Chapter 82 Configuring Moodle The following is an overview of the steps required to configure the Moodle Web application for single sign-on (SSO) via SAML. Moodle offers SP-initiated SAML SSO only. 1 Prepare

More information

Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training

Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training Federated Identity Management Willem Elbers (MPI-TLA) EUDAT training Date: 26 June 2012 Outline FIM and introduction to components Federation and metadata National Identity federations and inter federations

More information

SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service

SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service Document Version: 1.0 2014-09-01 Content 1....4 1.1 Release s....4 1.2 Product Overview....8 Product Details.... 9 Supported Browser Versions....10 Supported Languages....12 1.3 Getting Started....13 1.4

More information

Identity Federation For Authenticating and Authorizing Researchers

Identity Federation For Authenticating and Authorizing Researchers Identity Federation For Authenticating and Authorizing Researchers Cletus Okolie NOC Manager Eko-Konnect Research and Education Initiative Outline What are IdFs? IdF components Software Packages for IdF

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

Federated Identity Architectures

Federated Identity Architectures Federated Identity Architectures Uciel Fragoso-Rodriguez Instituto Tecnológico Autónomo de México, México {uciel@itam.mx} Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET Institut National des Télécommunications,

More information

External and Federated Identities on the Web

External and Federated Identities on the Web External and Federated Identities on the Web Jan Pazdziora Sr. Principal Software Engineer Identity Management Special Projects, Red Hat 1 st October 2015 Scope and problem statement Applications get deployed

More information

The AAF and Shibboleth. eresearch Australasia 2007. Prof. James Dalziel james@melcoe.mq.edu.au. Neil Witheridge nwitheridge@melcoe.mq.edu.

The AAF and Shibboleth. eresearch Australasia 2007. Prof. James Dalziel james@melcoe.mq.edu.au. Neil Witheridge nwitheridge@melcoe.mq.edu. The AAF and Shibboleth Prof. James Dalziel james@melcoe.mq.edu.au Neil Witheridge nwitheridge@melcoe.mq.edu.au Dr. Aizhong Lin alin@melcoe.mq.edu.au Macquarie E-Learning E Centre of Excellence (MELCOE)

More information

Lets get a federated identity. Intro to Federated Identity. Feide OpenIdP. Enter your email address. Do you have access to your email?

Lets get a federated identity. Intro to Federated Identity. Feide OpenIdP. Enter your email address. Do you have access to your email? Lets get a feated identity Intro to Feated Identity EuroCAMP Training for APAN32 This work is licensed un a Creative Commons Attribution ShareAlike 3.0 Unported License. Do you have access to your email?

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user

More information

Identity Management and E-learning Standards for Promoting the Sharing of Contents and Services in Higher Education

Identity Management and E-learning Standards for Promoting the Sharing of Contents and Services in Higher Education Identity Management and E-learning Standards for Promoting the Sharing of Contents and Services in Higher Education Paulo Alves ¹, James Uhomoibhi ² EUNIS E-learning Task Force ¹ ² ¹Instituto Politécnico

More information

Web Single Sign-On Authentication using SAML

Web Single Sign-On Authentication using SAML IJCSI International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 41 Web Single Sign-On Authentication using SAML Kelly D. LEWIS, James E. LEWIS, Ph.D.

More information

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion. Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On

More information

Logout in Single Sign-on Systems

Logout in Single Sign-on Systems Logout in Single Sign-on Systems Sanna Suoranta, Asko Tontti, Joonas Ruuskanen, Tuomas Aura IFIP IDMAN, London, UK, 8-9.4.2013 Logout in Single Sign-on Systems Motivation Single sign-on (SSO) systems SSO

More information

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more

More information

MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications

MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications MLSListings Single Sign On Implementation Guide Compatible with MLSListings Applications February 2010 2010 MLSListings Inc. All rights reserved. MLSListings Inc. reserves the right to change details in

More information